Garage4Hackers Ranchoddas Series Webcast on Powershell for post exploitation
Usage of Powershell in Post Exploitation would be covered. We will see that how powershell could be used for post exploitation activities like key-logging, backdoors, dumping system secrets, privilege escalation, pivoting, webshells etc. All the attacks would be done on a Windows 7 machine as target.
Name *
Please Enter your name
Your answer
Email-id *
Your answer
Country Name ?
Your answer
Employment *
Organization / University / College *
Your answer
Mobile Number
Your answer
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service